||Are you really who you say you are?
||secret keys, biometrics
||Is information secure and privacy protected?
||Can the data be changed or corrupted?
||Will the information be accessed only by authorized parties?
||access control lists, role based security
||Will the information be available when needed?
||disaster planning, recovering from crack attack, clustering, data backup/redundancy
||what is the proof of a digital transaction?